Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2024-03-14 15:25 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
[Special Invited Talk]
Aiming for the future optical networks
-- 20 years with PN-TC and Keio Future Optical Network Open Research Center -- Naoaki Yamanaka (Keio Univ.) PN2023-75 |
[more] |
PN2023-75 pp.32-36 |
PN |
2024-03-15 10:10 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
Optically powered antenna unit with remotely optical amplification using a multi core fiber Mizuki Fukuyama, Motoharu Matsuura (UEC), Hidenori Takahashi, Noboru Yashikane, Takehiro Tsuritani (KDDI Research, Inc.) PN2023-79 |
We experimentally demonstrate a simultaneous transmission of data signal, feed light and pump light using a multi-core f... [more] |
PN2023-79 pp.53-57 |
PN |
2024-03-15 10:30 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
Power Saving Effects in Switched RoF Ryuta Murakami (Keio Univ.), Satoru Okamoto (UEC), Yoshihiko Uematsu, Takashi Kurimoto, Naoaki Yamanaka (Keio Univ.) PN2023-80 |
In order to realize higher speeds and greater capacity in the Beyond 5G era, it is expected to handle higher frequency b... [more] |
PN2023-80 pp.58-63 |
KBSE |
2024-03-14 17:10 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Reusable Self-Adaptive Intrusion Recovery for Cloud Native Applications Takumi Ikeda, Takuto Yamauchi (Waseda Univ.), Kenji Tei (Tokyo Tech) KBSE2023-79 |
Research is being conducted on self-adaptive technologies that monitor, analyze, plan and execute adaptive actions at ru... [more] |
KBSE2023-79 pp.79-81 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 11:35 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Law and Policy on the Cybersecurity Supply Chain in the European Union Yusuke Tachibana (FIT) SITE2023-95 IA2023-101 |
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] |
SITE2023-95 IA2023-101 pp.169-171 |
NLC, IPSJ-NL |
2024-03-10 18:55 |
Hyogo |
(Primary: On-site, Secondary: Online) |
Language Model for Variable Definition Extraction from Chemical Process-related Papers Shota Kato, Kotaro Nagayama, Manabu Kano (Kyoto Univ.) NLC2023-25 |
Extracting variable definitions from scientific papers is crucial for understanding and leveraging research findings, ye... [more] |
NLC2023-25 pp.13-18 |
SS |
2024-03-07 15:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
SS2023-57 |
While code review plays a crucial role in enhancing software quality, it remains time-consuming. Over the years, various... [more] |
SS2023-57 pp.49-54 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-03 16:45 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Visualization of diverse solutions with different number of topics in topic models Toshio Uchiyama, Tsukasa Hokimoto (HIU) IBISML2023-44 |
The Latent Dirichlet analysis is known as a topic model that is useful
for analyzing data such as documents. The hiera... [more] |
IBISML2023-44 pp.29-35 |
MI |
2024-03-03 17:18 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Primary: On-site, Secondary: Online) |
3D shape reconstruction of colon with model-based unsupervised depth estimation Natsu Onozaka (Nagoya Univ.), Hayato Itoh (Fukuoka Univ.), Masahiro Oda (Nagoya Univ.), Masashi Misawa (Showa Univ.), Yuichi Mori (UiO), Shin-ei Kudo (Showa Univ.), Kensaku Mori (Nagoya Univ.) MI2023-60 |
We propose unsupervised trainig for the pose estimation in 3D reconstrcution of the colon from colonoscopic images by cl... [more] |
MI2023-60 pp.87-90 |
MI |
2024-03-04 10:22 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Primary: On-site, Secondary: Online) |
Robust segmentation approach over various training-to-test ratios for gross tumor volumes of lung cancer based on fused outputs Yunhao Cui, Hidetaka Arimura (Kyushu Univ.), Yuko Shirakawa (National Hospital Organization Kyushu Cancer), Tadamasa Yoshitake (Kyushu Univ.), Yoshiyuki Shioyama (Saga HIMAT), Hidetake Yabuuchi (Kyushu Univ.) MI2023-68 |
This study investigates robust deep learning (DL) methods for segmenting lung cancer from stereotactic body radiotherapy... [more] |
MI2023-68 pp.117-118 |
MI |
2024-03-04 15:22 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Primary: On-site, Secondary: Online) |
Prediction of Cancer Relapse for Non-Small Cell Lung Cancer Patients Using Clinical and Imaging Features Before Stereotactic Ablative Radiotherapy Takumi Kodama, Hidetaka Arimura (Kyushu Univ.), Yuko Shirakawa (Kyushu Cancer Center), Kenta Ninomiya (Sanford Burnham Prebys Med. Discov. Inst.), Tadamasa Yoshitake (Kyushu Univ.), Yoshiyuki Shioyama (SAGA HIMAT) MI2023-85 |
The aim of this study is to predict locoregional relapse and distant metastasis in stage I non-small cell lung cancer pa... [more] |
MI2023-85 pp.173-175 |
EMM |
2024-03-02 14:00 |
Overseas |
Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency |
[Poster Presentation]
Improved Ultimate Link without markers for projective transformation Keiji Yamadera, Michiharu Niimi (KIT) EMM2023-90 |
We propose a method that links character string having a certain semantic meaning on papers in real world to the digital... [more] |
EMM2023-90 pp.7-12 |
ET |
2024-03-03 12:40 |
Miyazaki |
Miyazaki University |
Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education Kazuaki Yoshihara (Kindai Univ.) ET2023-68 |
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] |
ET2023-68 pp.100-103 |
HCS |
2024-03-02 14:05 |
Shizuoka |
Tokoha University(Shizuoka-Kusanagi Campus) |
Online Dialogue Environment Design for Effective Use of Collective Intelligence in Group Problem Solving Masanari Ichikawa, Yugo Takeuchi (Shizuoka Univ.) HCS2023-96 |
This study conducted an experiment in which participants generated ideas in a face-to-face situation that simulated an o... [more] |
HCS2023-96 pp.48-53 |
EMD |
2024-03-01 13:45 |
Chiba |
|
A study on analysis of rotation phenomena of MMF speckle patterns with deep learning Ryusei Sato, Makoto Hasegawa (Chitose Inst. of Science and Technology) EMD2023-41 |
When laser light beams are allowed to propagate from one end of an optical fiber to the other end and further to be outp... [more] |
EMD2023-41 pp.13-18 |
NS, IN (Joint) |
2024-02-29 09:45 |
Okinawa |
Okinawa Convention Center |
Performance Comparison of Raspbian and LineageOS on Raspberry Pi Hardware Toshihiro Matsuda, Kien Nguyen, Hiroo Sekiya (Chiba Univ.) NS2023-191 |
In recent years, there has been a proliferation of IoT applications, including smart homes, smart agriculture, and smart... [more] |
NS2023-191 pp.113-118 |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
An automatic optimal placement system for applications in MEC environment Mudai Kobayashi, Mohammad Mikal Bin Amrul Halim Gan, Takahisa Seki (SoftBank), Takahiro Hirofuchi, Ryousei Takano, Mitsuhiro Kishimoto (AIST) NS2023-235 |
In post-5G, distributed systems need to process real-world information in real time in a scalable manner. In this paper,... [more] |
NS2023-235 pp.373-378 |
VLD, HWS, ICD |
2024-03-01 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-random Number Generator Design Robust against Fault Injection Attacks Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112 |
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] |
VLD2023-123 HWS2023-83 ICD2023-112 pp.125-130 |
VLD, HWS, ICD |
2024-03-01 15:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119 |
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] |
VLD2023-130 HWS2023-90 ICD2023-119 pp.161-166 |